http://news.bbc.co.uk/2/hi/technology/7719281.stm, Study shows how spammers cash in, BBC News, November 10, 2008 [academic researchers control 75,869 hijacked machines to send out 496 million of their own spam messages, directing recipients to their own fake web site to see how many would attempt a purchase]

http://www.esquire.com/features/predator, Tonight on Dateline This Man Will Die, Esquire magazine, August 2, 2007 [An argument for carefully defining how the private sector and law enforcement work together.]

http://www.govexec.com/dailyfed/0707/072707bb1.htm, Defense Net Attacks Should Be Countered With 'Disproportionate Response', "What's Brewin?" column, by Bob Brewin, Govexec.com, July 27, 2007 [Of course its not clear exactly how the "highly undesirable consequences" will be directed at the right "attacker's systems" and not 100,000 mom's and pop's PCs on broadband connections.]

http://www.mit-kmi.com/archive_article.cfm?DocID=51, Computer Offensive: While the new cyberspace security strategy focuses on defending crucial information networks, some U.S. officials are studying the possibility of launching cyberattacks against other countries, by Mickey McCarter, Military Information Technology, November 15, 2002

http://www.okgazette.com/news/templates/news.asp?articleid=597&zoneid=3, Spyware act gutted: The would-be "Computer Spyware Protection Act" was deleted in a legislative committee at the end of this year's regular session. The Senate author of the bill said the companies originally behind writing it dropped their support., by Ben Fenwick, Oklahoma Gazette, June 07, 2006

http://www.wired.com/news/digiwood/0,1412,57112,00.html, Hitting P2P Users Where It Hurts, by James Maguire, Wired News, January 13, 2003 [Note: Using 10,000 servers in a peer-to-peer network could mean compromising them first and taking them over. You don't go around buying 10,000 PCs and sticking them on 10,000 DSL lines.]

http://www.nbc.gov/pip.cfm, BAA 03-03-FH (Information Assurance For the US Intelligence Community Broad Agency Announcement aimed at attack attribution. Defines four levels of attribution that are useful in framing the topic.)

http://www.proxypot.org/yui.pdf, Criminal complaint in case of U.S. v. John Lin, Shao Yui, Elaine Espinosa, and Daniel Mankani, U.S. District Court, Eastern District of Michigan (spam honeypots used to collect evidence in CAN-SPAM Act case)